Artwork

Player FM - Internet Radio Done Right
Checked 4M ago
Added two years ago
Content provided by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
icon Daily Deals

RCR 158: Emerging Threats & Trends and the Future of Cybersecurity

32:33
 
Share
 

Manage episode 463573632 series 3464648
Content provided by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Is your business ready to tackle the hidden vulnerabilities lurking within your software supply chains? Discover the profound impact of President Biden's recent cybersecurity executive orders and learn why third-party software is a crucial focal point for safeguarding your organization. From real-world examples to actionable insights, I navigate the complex realm of cybersecurity, especially for small and medium-sized companies operating under the CMMC framework, while addressing the looming cyber threats posed by nation-states.
Explore the intricate web of emerging threats challenging today's digital landscape. As software dependencies and hardware compromises become commonplace, I illuminate the critical need for a future-proof security strategy that addresses the burgeoning power of quantum computing. From the risks of data poisoning and the sophistications of deepfakes to the potent social engineering tactics manipulating political and market environments, this episode uncovers the multifaceted vulnerabilities businesses must contend with to ensure their cybersecurity.
Unlock advanced strategies to build a cyber-resilient organization. By implementing a cybersecurity mesh and embracing identity-first security approaches, your company can stay ahead of sophisticated threats. As I discuss the transformative role of generative AI in both defensive measures and cyber threats, the importance of automated detection and response becomes evident. Cultivating a security-aware culture and ensuring robust supply chain security are essential, as these elements play a pivotal role in maintaining business continuity amidst a rapidly evolving cyber landscape. Join me for a deep dive into continuous improvement and proactive planning, equipping your business with the skills needed to fend off future attacks.

Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

  continue reading

Chapters

1. Cybersecurity Threats and Trends (00:00:00)

2. Emerging Cybersecurity Threats and Trends (00:10:43)

3. Advanced Cybersecurity Strategies and Resilience (00:21:33)

4. Continuous Improvement in Cybersecurity (00:26:29)

189 episodes

Artwork
iconShare
 
Manage episode 463573632 series 3464648
Content provided by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Is your business ready to tackle the hidden vulnerabilities lurking within your software supply chains? Discover the profound impact of President Biden's recent cybersecurity executive orders and learn why third-party software is a crucial focal point for safeguarding your organization. From real-world examples to actionable insights, I navigate the complex realm of cybersecurity, especially for small and medium-sized companies operating under the CMMC framework, while addressing the looming cyber threats posed by nation-states.
Explore the intricate web of emerging threats challenging today's digital landscape. As software dependencies and hardware compromises become commonplace, I illuminate the critical need for a future-proof security strategy that addresses the burgeoning power of quantum computing. From the risks of data poisoning and the sophistications of deepfakes to the potent social engineering tactics manipulating political and market environments, this episode uncovers the multifaceted vulnerabilities businesses must contend with to ensure their cybersecurity.
Unlock advanced strategies to build a cyber-resilient organization. By implementing a cybersecurity mesh and embracing identity-first security approaches, your company can stay ahead of sophisticated threats. As I discuss the transformative role of generative AI in both defensive measures and cyber threats, the importance of automated detection and response becomes evident. Cultivating a security-aware culture and ensuring robust supply chain security are essential, as these elements play a pivotal role in maintaining business continuity amidst a rapidly evolving cyber landscape. Join me for a deep dive into continuous improvement and proactive planning, equipping your business with the skills needed to fend off future attacks.

Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

  continue reading

Chapters

1. Cybersecurity Threats and Trends (00:00:00)

2. Emerging Cybersecurity Threats and Trends (00:10:43)

3. Advanced Cybersecurity Strategies and Resilience (00:21:33)

4. Continuous Improvement in Cybersecurity (00:26:29)

189 episodes

All episodes

×
 
The digital landscape for financial institutions has forever changed with the rapid advancement of artificial intelligence and machine learning technologies. What started as simple robotic process automation has evolved into sophisticated AI systems capable of transforming everything from fraud detection to customer service - but at what security cost? Sean Gerber draws on his 20+ years of cybersecurity experience across military, corporate, and consulting roles to deliver a crucial message: AI implementation must follow a "secure by design" approach from day one. Organizations that rush to deploy AI solutions without proper security frameworks find themselves facing exponentially more difficult remediation challenges just 2-3 years later. Through clear, accessible explanations, Gerber demystifies the differences between artificial intelligence, machine learning, and large language models while highlighting their practical applications in financial services. From JP Morgan's AI-powered legal contract reviews to Bank of America's advanced security measures, real-world examples demonstrate both the transformative potential and inherent risks of these technologies. The episode provides a pragmatic roadmap for financial institutions navigating AI implementation, covering essential frameworks like the NIST AI Risk Management Framework and critical security considerations including data anonymization, network segmentation, and intellectual property protection. Gerber emphasizes that while robust security requires investment, the alternative - retrofitting security after problems emerge - proves far more costly in both financial and reputational terms. Whether your organization is just beginning to explore AI capabilities or already deploying advanced solutions, this episode delivers actionable guidance for building multidisciplinary teams, developing AI-specific security policies, and creating governance structures that balance innovation with protection. As Gerber notes, "AI in banking is here to stay. It's transformational, but not without risk" - and the time to implement proper safeguards is now. Ready to strengthen your organization's AI security posture? Connect with Sean through Reduce Cyber Risk, CISSP Cyber Training, or Next Peak for personalized guidance on your AI security journey. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
The boundary between physical and cybersecurity is rapidly disappearing, creating both challenges and opportunities for security professionals across domains. This eye-opening conversation with Casey Rash from Secure Passage explores how modern physical security devices have evolved into sophisticated IoT endpoints generating valuable security data that traditional teams often lack the expertise to fully leverage. Drawing from his diverse background spanning military intelligence, fintech, logistics, and cybersecurity, Casey offers unique insights into the convergence of physical and cyber domains. He introduces Secure Passage's innovative solutions: Haystacks for critical infrastructure monitoring and Truman for Physical Detection and Response (PDR), which applies familiar cybersecurity principles to physical security data streams. Through practical examples ranging from employee termination scenarios to school safety monitoring, we explore how the integration of physical and cyber domains addresses critical security gaps. Modern smoke detectors can now detect THC, gunshots, and calls for help, while surveillance systems incorporate advanced AI capabilities like object detection and crowd analysis – all generating data streams that most organizations aren't effectively monitoring. For CISSP candidates and security professionals, the conversation maps these solutions to relevant domains including Security Operations, Asset Security, and Identity and Access Management, providing valuable context on how theoretical security principles translate to real-world challenges. Casey offers a provocative perspective: "Most of the responsibility for unifying security systems lies on the cyber side, because we understand the data." Whether you're studying for certification or leading security strategy, this discussion will expand your understanding of converged security and the growing importance of holistic approaches that span both physical and digital realms. Connect with Casey at SecurePassage.com to learn more about bridging these traditionally siloed domains. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Unlock the secrets to safeguarding your business in today's volatile supply chain landscape. On this episode of the Reduce Cyber Risk Podcast, hosted by Shon Gerber, we take you on a journey through the intricacies of cybersecurity in supply chains. With rapid technological advancements and the rise of AI models like DeepSeek, businesses must navigate data security challenges like never before. You'll discover why countries such as Italy are limiting these AI tools and learn how to balance innovation with caution to protect sensitive data from potential threats. Embark on a comprehensive guide to establishing a robust Cyber Supply Chain Risk Management (CSERM) program. Together, we'll explore strategies to secure stakeholder buy-in and cultivate organizational awareness through tailored training initiatives. By aligning your CSERM goals with your mission and compliance requirements, especially if you’re handling government contracts or operating within the financial sector, you can proactively guard against cyber threats. Prioritize critical assets and integrate CSERM into vendor selection to mitigate vulnerabilities across third-party relationships. For businesses lacking internal cybersecurity resources, resourceful strategies are at your fingertips. From harnessing the power of online tools like Google and ChatGPT to leveraging expert consulting services, we offer insights into fortifying your defenses. Dive into the wealth of resources available at ReduceCyberRisk.com, including free materials and training opportunities for IT teams. Whether you're taking your first steps or refining your existing measures, this episode equips you with the knowledge to strengthen your cybersecurity posture and safeguard your organization against evolving threats. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Is your business ready to tackle the hidden vulnerabilities lurking within your software supply chains? Discover the profound impact of President Biden's recent cybersecurity executive orders and learn why third-party software is a crucial focal point for safeguarding your organization. From real-world examples to actionable insights, I navigate the complex realm of cybersecurity, especially for small and medium-sized companies operating under the CMMC framework, while addressing the looming cyber threats posed by nation-states. Explore the intricate web of emerging threats challenging today's digital landscape. As software dependencies and hardware compromises become commonplace, I illuminate the critical need for a future-proof security strategy that addresses the burgeoning power of quantum computing. From the risks of data poisoning and the sophistications of deepfakes to the potent social engineering tactics manipulating political and market environments, this episode uncovers the multifaceted vulnerabilities businesses must contend with to ensure their cybersecurity. Unlock advanced strategies to build a cyber-resilient organization. By implementing a cybersecurity mesh and embracing identity-first security approaches, your company can stay ahead of sophisticated threats. As I discuss the transformative role of generative AI in both defensive measures and cyber threats, the importance of automated detection and response becomes evident. Cultivating a security-aware culture and ensuring robust supply chain security are essential, as these elements play a pivotal role in maintaining business continuity amidst a rapidly evolving cyber landscape. Join me for a deep dive into continuous improvement and proactive planning, equipping your business with the skills needed to fend off future attacks. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Uncover the secrets to mastering cybersecurity amidst a booming demand for IT professionals. Join me, Shon Gerber, as we tackle the thrilling landscape of tech opportunities, where U.S. tech unemployment has reached a two-year low. Discover how certifications like CompTIA can launch your career in this high-stakes field, and learn why experience is becoming more critical than formal degrees in certain roles. We also spotlight hiring trends at industry giants like Amazon and Deloitte, showing why now is the perfect time to step into the world of IT and cybersecurity. Dive into the mind of a cyber attacker as we dissect their motivations, from government-backed nation-state operatives to curious script kiddies. Understanding these varied personas and their goals is vital for businesses safeguarding valuable intellectual property. We explore the financial, social, and disruptive motives driving cyber threats, shedding light on the broader implications for global financial stability as highlighted by the International Monetary Fund. This knowledge is crucial for businesses to develop strategies that fortify their defenses against potential cyber threats. Prepare yourself for potential cyber threats with strategies inspired by elite air-to-air combat training. Specialized training, operational exercises, and robust cybersecurity frameworks like NIST CSF and ISO 27001 are essential to bolstering your organization's security posture. We emphasize the critical need for comprehensive business resiliency plans and well-developed incident response strategies. Equip yourself and your team with the necessary tools and know-how to withstand cybercriminals, ensuring your digital defenses are more formidable than ever before. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
From the cockpit of a B-1 bomber to the nerve centers of global cybersecurity, I, Shon Gerber, invite you to explore the thrilling transition that shaped my career and mission. Discover the unexpected parallels between flying high-stakes missions and safeguarding billion-dollar enterprises from cyber threats. This episode offers a personal narrative of my journey, highlighting my experiences on the US Air Force Red Team and the critical role these played in forging a path into the world of cybersecurity. You'll hear about the moments that defined my career, my insights on balancing family life, and my commitment to making cybersecurity accessible and effective for businesses everywhere. Join me as we navigate the complex challenges of managing security for a Koch Industries company, where I held the reins as Chief Information Security Officer. Learn how I tackled the intricacies of protecting intellectual property and global operations, and why I believe that preparedness is the strongest defense against cyber threats. We'll discuss my transition to consulting, my teaching experiences at Wichita State University, and the pressing need for businesses to fortify their defenses against hackers. Through this episode, I aim to empower you with the knowledge and tools to reduce cyber risks, ensuring your organization's resilience in the face of potential attacks. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Ever get tangled up in the complexities of identity and access management? Tired of letting confusion rob you of effective cybersecurity strategies? Well, it's time to tune in and simplify it all! As your resident cybersecurity expert, Sean Gerber, I'll be taking the reins in this exciting journey into the heart of identity and access management. We'll tackle the big three – identity management, federated identity management, and credential management systems. Believe me when I say, by the end, you'll be navigating these concepts like a pro! Are you ready to discover the true value of identity and access management? We all know security is paramount, but have you considered the benefits to productivity, user experience, and cost savings? Let's uncover these hidden perks together! The aim isn't just to understand but to utilize this knowledge effectively. We'll discuss the crucial importance of timely user removal and how to tackle challenges head-on when the system breaks. The big bonus? We'll also dig into how IAM aids in meeting those pesky compliance requirements and how automating processes can really save you a penny or two. No cybersecurity journey would be complete without a deep dive into SAML, OAuth2, and OpenID Connect. Sounds complicated? Not for long! I'll be your guide as we examine these protocols and their roles in transferring authentication and authorization data. By the end, you'll understand SAML assertions, OAuth2's tokens, and how OpenID Connect is built on top of OAuth2. And, because we believe in value beyond theory, we'll explore real-world examples too. But that's not all! Stick around as I share how you can access free CISSP questions online and why joining the CISSP cyber training community is a game-changer. So, are you ready to revolutionize your understanding of identity and access management? Let's rock and roll! Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Ever wondered how to ace the CISSP Cyber exam's domain four? Or, perhaps, you're merely intrigued by the intricate world of Voiceover IP (VOIP)? Either way, this episode is packed with the insights you've been seeking! Join me, Sean Gerber, as we dissect the key protocols that VOIP uses for multimedia transmissions. Together, we'll unravel the complex intricacies of Session Initiation Protocol (SIP) messages and how sessions kick off in a VOIP implementation. You'll also gain an understanding of the differences between Real-Time Transport Protocol (RTP) and Real-Time Transport Control Protocol (RTCP) and how they're applied. As we journey deeper into this episode, we'll explore the fascinating world of Internet Small Computer Systems Interface (iSCSI), focusing on its functions and default ports. Fear not, the mystery of SCSI command encapsulation will no longer be a mystery to you! We'll then shift our attention to the security aspects of SIP-based VOIP traffic, scrutinizing SIP-aware firewalls and the implementation of Transport Layer Security (TLS). Finally, we'll round off our discussion by examining RTCP's role in providing quality of service feedback in a VOIP implementation and wrapping up with an understanding of block-level transport in iSCSI. Prepare to expand your cybersecurity knowledge in a way you never thought possible! Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Ever wish you could decrypt the mysteries of cybersecurity and ace your CISSP exam? This episode is your treasure map to success, guiding you through the labyrinthine layers of the OSI model, starting with the physical transmission of data and the crucial role of physical access controls. We also enlighten you about MAC address filtering and how it fortifies network security. As we move deeper, we unlock the secrets of encryption, digital signatures, and secure coding practices. We delve into the heart of the session and presentation layers, spotlighting the importance of input validation and secure API design. Get to appreciate the role of protocols like Session Initiation Protocol and Real-Time Transport Protocol in VoIP. We also bring to light the security risks associated with VoIP and iSCSI, introducing you to the sinister world of call hijacking, eavesdropping, and toll fraud. Finally, we don our armor and arm you with the best security controls for VoIP, such as encryption, authentication, and access control. And just when you thought it couldn't get better, we guide you on how to hit the bullseye in your CISSP exam. Exploring the benefits of a CISSP Cyber Training membership and how it sets you up for a triumphant win in the exam. So, gear up for a thrilling voyage into the captivating realm of cybersecurity. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Ready to conquer the CISSP exam? Join me, Sean Gerber, as I break down complex concepts and guide you through an in-depth exploration of threat models, including their components and the crucial role they play in identifying and mitigating potential threats. You'll not only get an understanding of the TRITE methodology and when to use STRIDE or DREAD, but also learn to pinpoint which threats in STRIDE refer to an act that modifies data or system configurations. We'll unravel the secrets of successful threat modeling and the key steps involved - leaving no stone unturned. Unearth how to interpret multiple choice questions, and understand the nitty-gritty of the TRITE methodology. In addition, we'll shed light on the importance of updating and maintaining threat models as an ongoing process. This episode is guaranteed to leave you feeling prepared and confident for the CISSP exam. Don't just take the exam, ace it! Tune in to this episode and get set to become a pro at threat modeling. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Are you prepared to defend your organization from cybersecurity threats? I'm Sean Gerber, and this week I'm unraveling the intimidating world of threat modeling. Get ready to supercharge your cybersecurity knowledge as we dissect threat identification, risk assessment, and mitigation strategies. This isn't just for acing your CISSP exam, it's for becoming an indispensable security professional who can effectively safeguard your organization. We'll embark on a journey through the labyrinth of regulatory compliance, and work towards mastering the art of threat modeling. We’ll highlight the importance of robust communication, continuous education, and the strategic role of stakeholders in countering threats, vulnerabilities, and concealed secrets buried in code repositories. Expect to gain a comprehensive understanding of Stride and Trike threat modeling, underlining the significance of tackling repudiation, information disclosure, denial of service, and elevation of privilege to safeguard sensitive information. As we delve deeper, we'll expose the vulnerabilities and considerations of Trike security, emphasizing the criticality of well-defined security requirements, cost implications, and essential automated tools. I'll also divulge my blueprint for the CISSP exam available on CISSP cyber training. This is more than just a tutorial - it's your stepping stone to becoming a proficient cybersecurity professional. So, brace yourself for an episode teeming with insights and tactical strategies that you can't afford to miss. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Are you ready to unlock the secrets of data classification and pass your CISSP exam in one go? That's right! Your host, Sean Gerber, is here to guide you through an insightful exploration into the world of data classification. From the intricacies of content-based and context-based data classification to the various stages of the information life cycle, this episode promises to be a goldmine of information. We'll dissect the appropriate levels of data classification suitable for different types of data and unravel the efficiency of various asset classification methods. Ever wondered when user-based classifications would come in handy or how assets are effectively grouped into categories like finance, HR, and IT departments? We've got you covered! This episode dives deep into the asset life cycle stage and the sophisticated tools that analyze unstructured data. On top of that, we also demystify the commonly utilized levels of data classification like public, internal use, highly confidential, and restricted. As we delve into these layers, we'll differentiate between them and shed light on why the secret level is rarely used in commercial entities. Join us and boost your CISSP exam preparation while developing a broader understanding of data classification. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Are you ready to make your digital assets and information impenetrable? Well, we're here to navigate you through the maze of understanding and protecting your most valued digital treasures. This episode is packed with a wealth of knowledge, as we discuss the intricacies of information and asset protection. We highlight the vitality of data classification, and the importance of effectively training your team to attach the right labels. Your senior team needs to be on the same page with you when it comes to data security. We uncover the crucial link between information and assets and how they are dependent on each other. Mobile devices often carry valuable data, making them susceptible to threats. To avoid a compromise, it's important to understand the potential risks and impacts of placing sensitive data on such assets. And, should a compromise occur, we discuss the possible repercussions, including reputational damage and lost future earnings. The journey doesn't stop there. We move on to the defining stages of the information lifecycle, emphasizing the need for secure data collection and sharing processes. Misclassifying data can have dire consequences, hence we delve into various classification types and the importance of having protective policies. Lastly, we give a sneak peek into asset tracking and management tools, and how to choose the right one for your use case. Remember, understanding, protecting, and handling digital assets and information securely is a crucial part of the CISSP domain 2 exam. So, fasten your seatbelt as we take you on this enlightening journey. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Are you charged with navigating the precarious terrain of supply chain risk management? Then, prepare to sharpen your skills in this action-packed episode! I'm Sean Gerber, and I'll be guiding you through the labyrinth of supplier audits and evaluations, discussing the delicate balance between the two. We'll also delve into strategies for mitigating risk, including the benefits of outsourcing to multiple vendors and having redundant suppliers for those all-important components. But that's not all! We also take a journey through the CISSPcybertraining.com site, a haven for those gunning for the CISSP certification. I'll unpack the site's blueprint, highlighting how the questions available can be a treasure trove for exam prep. On top of that, you'll hear about the growing popularity of the CISSP exam and how YouTube is buzzing with resources to support candidates. So, whether you’re studying for the CISSP exam, or you’re just hungry to broaden your cybersecurity and risk management knowledge, this episode is your ticket to enlightenment. Tune in! Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Prepare to unravel the complexities of supply chain risk management (SCRM) and gain invaluable insights that could safeguard your business from massive disruptions. We're diving into the nerve-wracking challenges of SCRM, emphasizing just how crucial it is for every business in our hyper-connected age. Learn about the nuances of this formidable task as we explore real-life scenarios that underline the dire need for security professionals to lend their expertise to those who find themselves in the deep end of SCRM vulnerabilities. We're laying out the intricate tapestry of SCRM domains, from hardware and software to third-party services, casting light on the risks associated with outsourcing. We'll guide you through the maze of supply chain elements, helping you identify potential risks and understand the threats looming over your daily operations. It's not all gloom and doom though; we'll also equip you with proven strategies like engaging third-party services such as Showdan and Security Scorecard for supply chain reviews, and the critical role legal and compliance teams play in this intricate dance. As we wrap up, we'll tackle the ominous reality of ransomware attacks on businesses. Using the chilling example of the 2017 NotPetya attack, we journey into the shadowy underworld of cybercrime, where profit margins are hefty, and the risk to the perpetrators is minimal. With the projected cost of ransomware attacks set to hit a staggering $25 billion by 2025, we explore the dire implications of this trend. As somber as these realities might be, our intent is to arm you with the knowledge and resources to fortify your supply chain and protect your business. Join us, and let's navigate these choppy waters together. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.…
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play